Cisco Umbrella Stage Workshop Guide PDF
Cisco Umbrella Stage Workshop Guide PDF
1
Course Introduction
• Overview
- This course will take a Field Engineer through deploying their first Umbrella
deployment in a controlled dCloud lab environment.
• Expectations
- Student is familiar with Umbrella and has completed Umbrella Stage 2 Deployment
track in the Fire Jumper Academy for Field Engineers
- Stage 2 knowledge is critical to your overall Umbrella learning path. The Lecture
included in this course is meant to serve as both an overview and preparation for
the included labs but is not a complete knowledge transfer.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 2
2
Instructors
• Jamie Sanbower - [email protected]
• Usman “Uzi” Ahmed – [email protected]
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 3
3
Fire Jumper Roles
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 4
4
Fire Jumper Stages – Umbrella Field Engineer
• Stage 1 - Registration
• Stage 2 - Product Fundamentals
• Stage 3 - Instructor Led Training (ILT) Class w/ Lab YOU ARE HERE
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 5
5
Umbrella 101 Field Engineer Course Outline
• Module 1 – Fundamentals • Module 6 – SWG
• Module 2 – Deployment • Module 7 – Advanced SWG
Module 3 – Identity Module 8 – Investigate
Day 1
Day 2
• •
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 6
6
Umbrella FE Labs
1. DNS Network Protection 9. Secure Web Gateway
2. DNS Branch Protection 10. CASB / Cloud Malware
3. Active Directory Integration 11. Data Loss Prevention
Day 1
Day 2
4. Roaming Device Protection 12. Remote Browser Isolation
5. Virtual Appliances 13. Operations & Troubleshooting
6. SIG Network Tunnel 14. Investigate
7. Cloud Delivered Firewall 15. APIs & Integrations
8. Intrusion Prevention System 16. SecureX
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 7
7
Course Details
8
‣ Widget Maker with R&D, Sales,
Marketing and Executives
9
Module 1
Fundamentals
10
This is how things used to work with network and security.
• All applications used to be hosted on-prem. You had to be on the corp network in
order to access them/get work done.
• Branch offices would tunnel all traffic back to the corp datacenter over MPLS –
80% of the traffic was internal
• All internet access was routed there
• And you had a complete security stack – firewall, SWG, etc. - deployed within
corporate data center or HQ
For years, this was the way that most companies deployed their network architecture
and it allowed you to have a single place for all security on your network.
11
Over the last 5 years there has been a drastic increase in Internet traffic.
Organizations have continued to adopt cloud applications and storage and are
running more of their workloads from the cloud.
Now the percentage of Internet traffic is typically higher than the internal traffic.
Backhauling all this traffic through expensive MPLS lines and VPNs doesn’t make
sense any more.
This old centralized approach forces all of the internet traffic through the single stack
of security appliances. This is leading to performance problems, impacting user
satisfaction and causing issues with SaaS adoption in many organizations.
and then to have it get backed up trying to go through the single security stack on
premise is costly and it leads to a very poor user experience.
12
Today, networks are becoming decentralized. Because of the internet and cloud, you
can connect and get work done from any device, any location, and any time.
But, as you move towards more direct internet access, security needs to be a major
consideration:
• You can no longer depend on your existing, on-premises security stack
• You need a way to secure your branch edge and cloud edge.
13
4out of 5
orgs are shifting to direct
internet access (DIA)
Source: ESG Research Survey, Cisco Secure Internet Gateway Survey, January 2019
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 14
--------------------------------
Respondents info:
• 450 cybersecurity, IT and networking security professionals
• Responsibility or knowledge of branch office security responded
• With headquarters in North America and Western Europe
• With 500+ employees and $50M in annual revenue
14
We already know that the best defense is a layered approach. Umbrella has
a robust set of layered security capabilities along with the best security
efficacy in the industry.
15
Cisco Umbrella evolution
OpenDNS Umbrella Cisco Cisco Umbrella adds Cisco Umbrella adds
for Business enterprise acquisition security functionality SWG, FWaaS, and
internet CASB functionality plus
security SDWAN integration
SIG
SASE
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 16
On the bottom half of this slide you see a progression of cloud delivered functionality
for internet access, security and networking. More recently there has been a much
needed move towards consolidation and simplification in these areas. A few years
ago, Secure Internet Gateway (SIG) was the hot label for a consolidated set of cloud
delivered security functions. Just last fall the concept of a Secure Access Service Edge
emerged on the scene as an even broader set of security functions combined with
edge networking functionality.
Up top, you see that Cisco has been building a multi-function cloud-based security
solution and is integrating edge networking functionality to meet market needs.
OpenDNS for business started in 2009 with DNS resolution and added the initial
security functions in 2012. After the Cisco acquisition in 2015 we continued to add to
the security capabilities of this high performance cloud native solution.
Then in 2017, we announced Umbrella as a secure internet gateway (SIG) with
multiple cloud delivered security components integrated into a single cloud service.
In the last couple of years Cisco has been adding a broader set of security
functionality within the single Umbrella cloud console. This includes a Secure Web
Gateway (SWG), firewall-as-a-service, CASB functionality and we have simplified the
16
integration with edge devices including the popular SD-WAN integration. Cisco is the
leader in both security and networking and we are uniquely qualified to bring the
best of these two worlds together in a modern, cloud-delivered format that will keep
you better protected while saving you time and money.
Let’s take a look at the evolution to SASE that Gartner has been exploring in recent
reports.
16
What is Secure Access Service Edge (SASE)?
Network as a service Security as a service
SASE
SD-WAN SSE
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 17
At a high level, if you add a SD-WAN to an SSE architecture model, you have what
Gartner calls a Secure Access Service Edge architecture model. It’s better known as
SASE (pronounced sassy), and here is high-level illustration of what it looks like.
SASE requires little to no hardware and employs
cloud technology to combine SD-WAN with security functions,
including:
17
Umbrella packages SIG Advantage
DNS Security
Secure Web Gateway and DNS Security Advantage
Advantage
DNS Security
Essentials Selective Web Proxy | Web Filtering | File Inspection: AV and Secure Endpoint | Investigate Console + On-demand Enrichment API
DNS for EDU: Same feature set
Policy, Reporting and Enforcement APIs | Cisco SecureX | S3 Log Management (not in EDU) | Multi-Org Console | DOH | DNSSEC | Threat Lens
Umbrella DNS security: Domain Filtering, Security Blocking and App Discovery and Blocking | Network and Branch Protection (VA + AD Connector) + Roaming + Mobile User Protection |
Cisco Secure Mobility Client (AnyConnect) license for simpler roll out | Highly available, Global cloud architecture powered by Umbrella and Talos threat intelligence
24x7 access to Cisco Cloud Security Support (Cisco Software Support Enhanced: Required attach) | (Optional) Premium Support Upgrade
18
19
Umbrella Global
Architecture
20
Born in the cloud global architecture
Rapid scalability, continuous innovation, high performance – without downtime
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 21
21
team with stellar, honed-in-the-trenches skills
across security, networking, cloud-native
architecture, threat research, data science, and
more.
•Umbrella’s DNS security capability have
delivered 100% business uptime since it
was first delivered in 2006.
•We are completely transparent. Cisco
Umbrella publishes a snapshot of our current
network status and a rolling 30-day view of
various operational messages and notices
online at https://status.umbrella.com/#/
• Recent Miercom testing of typical SaaS traffic showed that Umbrella’s network
delivers up to a 73% reduction in latency when compared to a typical ISP
connection, which translates into high performance.
21
Global cloud architecture
Multiple ISPs
Customer
locations Internet exchanges
On/off network
devices
Encryption head-end
Encrypted and
Remote unencrypted traffic
users options to connect Cloud firewall SaaS apps
to Umbrella Edge
Security services
Hardware
integrations
Umbrella cloud edge Cisco Clouds
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 22
Umbrella takes traffic in from multiple sources and breaks apart and inspects that
traffic based on the security stack the customer applies. Improved performance to
the destination is provided based on the peering with our cloud partners
22
Large, global footprint keeps expanding
STO1
CPH1
F RA1
AM S1
DUB1
WRW1
YVR1
L ON1
OTP1
38 DCs in SE A1 YYZ1
M I N1 CDG1
DE N1
CHI 1
23 countries
NYC1
M AD1
PAO1 ASH1
RST1 PRG1 NRT1
L AX1 DF W1 ATL 1 M RS1
M IL1
SE O1 OSA1
M I A1 DXB1
J E D1
HKG1
M UM 1
VA and Marseille, FR SI N1
100%
continues, across Americas,
Europe and Asia
• Ability to keep U.S. traffic RI O1
since 2006
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 23
A full list of DC and planned upgrades are at the end of this deck
23
Peering across the globe
Umbrella peering accelerates application performance
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial * Not comprehensive 24
When discussing performance, focusing on the number of data centers alone can be
misleading.
• Customers may falsely assume that connection
latency necessarily decreases when a vendor’s
data center is physically located closer to the
ISP data center that’s a connection point for
the customer’s network and devices.
• The shortest path between the ISP and the
vendor may require an excessive number of
intermediate stops due to a lack of peering or
transit relationships. This may still result in a
slower path between points A and B,
regardless of geographic distance.
• Peering relationships between providers
24
shorten the path that traffic travels between
them, reducing the number of routing hops,
shrinking latency, and improving performance.
• Umbrella’s 1000+ (and growing) peering
relationships significantly contribute to high
performance between customer
networks/devices, Umbrella, and content or
SaaS providers.
24
Anycast routing Example
• Rock-solid reliability and availability Data center region code US-1
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 25
25
Meets compliance standards
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 26
Customers are keen to follow industry compliance standards and for many
organizations, such compliance is mandatory (e.g. GDPR).
• GDPR compliance – Umbrella data centers meet or exceed Cisco's required data
protection and security standards to ensure the Umbrella Service complies with
GDPR and other applicable data protection laws
• Umbrella data centers meet or exceed Uptime Institute Tier III standards
• Carrier neutral – Umbrella selects data center locations purely on the best
connections and quality service (not financial relationships with carriers
26
Threat Intel
27
Cisco Talos Threat Intelligence
Trusted global provider of cutting-edge security research
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 28
• It’s an elite group of over 400 security experts devoted to providing superior
protection to our customers
• You can’t protect what you can’t see; the Cisco Talos team sees more threats,
more malware, more attacks than any other security vendor in the world. The
numbers here speak for themselves.
• When you see more, you can block more
28
Statistical and machine learning models
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 29
Behind these models is massive and diverse data, and an incredible research team
• Let’s look more closely at our data: Umbrella resolves more than 580 billion
daily DNS requests across our user base. Not only is this data massive – it’s also
diverse and represents all markets, geos, and protocols. This combines with the
enormous and sophisticated threat intelligence and research capability from
Cisco Talos, the largest non-governmental threat research organization on the
planet. These two things together give us an unprecedented view of the internet.
29
• Our models: They continuously run against our data
so we can uncover malicious domains, IPs, and URLs
before they’re even used in attacks. Our security
researchers are always innovating and creating new
models to provide better threat detection and
classification.
29
Multi-faceted threat intel
Botnet 1| 2|4
Umbrella
1. Lexical Crimeware 3 | 4
Live DGA prediction
DNS
Exploit Kit 2|4
IP BGP
2. Anomaly detection
DOMAIN
Newly seen domains
SSL WHOIS Phishing 1|2|4
IP
HASH WEB
3. DNS tunnelling Investigate
ETC Ransomware 2|4
4. Graph-based
Co-occurrence model Spam 2|4
Trojan 2 |3|4
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 30
We use our statistical models, our machine learning, and our analysts to sift through
the data. First we start with all that we know about data on the left. Map domains to
Ips, apply our models (some of which are represented here) and then based on the
various models we can map them to specific threat types.
30
Module 2
Deployment
31
Protect on-network devices via DNS, a great
starting point
208.67.222.222
Your policy
Laptop IP
Enforce all security settings Network egress IP Server IP 10.1.1.3
for 67.215.87.11 67.215.87.11 10.1.1.1
DNS server External DNS resolution
10.1.1.1 208.67.222.222
Your network
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 32
• Larger networks often already point all devices to an internal DNS server such as
Windows or BIND
• Again, a single IP change will forward only external DNS traffic to the Umbrella
global network
• We do not replace it or impact any of your internal DNS resolutions
• There are easier DNS device integration, like with Viptela not depicted here
32
Enterprise-wide
deployment
in minutes
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 33
- Through our built-in integrations with Cisco gear, you can use your existing Cisco
footprint to quickly provision thousands of network egresses and roaming laptops
– protecting your off-network users, branch users, and Wi-Fi users in minutes.
- We have integrations today with AnyConnect, ISR 1K and 4K devices, and new in
February — Cisco Wireless LAN controllers.
- For ISR 4K and WLAN controllers, you can set different policies for different VLANs.
So servers vs. workstations or with the Wireless LAN controllers - employee vs
guest Wi-Fi
33
Overview: Typical DNS Deployment Components
AD Server
w/AD connector
Associates
CEO with
EXEC group Associates CEO
(via HTTPS with 10.1.1.3
push) Internal
Internet gateway
Umbrella VA DNS Server
208.67.222.222
Appliance IP DHCP IP
Your policy Network egress IP 10.1.1.2 10.1.1.1
Enforce all security settings for 67.215.87.11 Inserts 10.1.1.3, DNS server
EXEC group DNS server GUID and Org ID 10.1.1.1
10.1.1.1 in EDNS request,Internal domains Laptop IP
(GUID = CEO, a member of EXEC group) encrypts and office.acme.com 10.1.1.3
forwards
Roaming CEO
Embed unique device
ID and GUID (if AD) Laptop
in EDNS request,
encrypts and forwards AnyConnect RSM YOUR NETWORK
or Umbrella RC
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 34
• In addition to our virtual appliance, you can have even greater granularity by using
our Active Directory (AD) connector
• Our Connector enables you to pinpoint infections by AD computer or user name,
or set policies by AD group membership, instead of internal subnets and IPs
• Deploy this auto-updated, read-only software on an Active Directory domain
controller or a separate Windows server domain member
• The Connector syncs only the user and computer group memberships to our
service under just your account using HTTPS
• When users authenticate, it also tells our VA the AD user, AD computer and the
internal IP of the device where they authenticated from
• When devices make DNS requests, the VA, which can see its internal IP, can now
insert the AD user and computer name to
• We do that using a globally unique identifier, which gets translated back into the
real AD user or computer name in our dashboard
34
Overview: Identity &
Deployment Types
DOMAIN REQUEST
IP RESPONSE
CONNECTION
HTTP/S
Securely embed identities within query Web-based redirects transparent to
using a RFC-compliant mechanism, user enable same identity for proxy
differing granularity based on deployment
+ + +
Umbrella Your DNS or Umbrella roaming Umbrella Umbrella AD Umbrella virtual Umbrella API for
deployments DHCP server client (RC) Chromebook client Connector appliance (VA) network devices
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial *Indicates identity available with Umbrella AD Connector 35
We’ve mentioned identities several times, so here’s how they’re made available
through various existing and new Umbrella deployments.
For every deployment, we’ll always know the egress IP if you’d like to provision your
networks as an identity in your policies. But for greater granularity, we offer both our
own stand-alone endpoint and network footprints as well as integrations with Cisco’s
and many customer’s existing footprints.
35
Flexible SIG connection methods
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial * Optional customer hosted PAC file 36
Cloud delivered firewall and SWG traffic can be sent from a variety of devices via an
IPsec tunnel.
A proxy chain or PAC file approach can be used to forward web traffic to the SWG. (In
order to use PAC file or Proxy Chaining you must first point your DNS to Umbrella to
be able to resolve to the closest SWG DC. Using only an IP for PAC files is supported
but comes at the expense of some HA capabilities.)
The Cisco Secure Client (AnyConnect) agent can be used to send both web traffic and
DNS traffic to Umbrella.
36
Traffic Redirection Methods
Selective Proxy
AnyConnect
Secure Web
PAC File
Gateway
Proxy Chaining
Traffic Orchestrator
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 37
37
Policy Enforcement Internet/
SaaS
Umbrella
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 38
38
Order of operation – rule match view
Firewall Policy
web non-web
WEB Policy
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 39
IMPORTANT :
39
Order of operations – policy component view
DNS Policy Rule Firewall Policy Rule WEB Policy Rule
Security Settings Security Settings
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 40
40
Content Categories - DNS versus WEB
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 41
umbrella distinguishes between DNS and WEB categories. they are not similar but not
100% the same. the reasons for this are historical.
41
Application settings – DNS versus WEB
DNS and WEB policy can block WEB policy can also control
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 42
similar thing about Application Control - DNS can detect an block, while WEB adds
more fine grained controls by limiting specific application functionality.
42
Proxy – Selective vs Full
PROXY Selective (DNS) Full (WEB)
Traffic being proxied Only graylist All
TLS decryption Yes Yes
Customer Certificate No Yes
Per Category,
Decryption exceptions Per Category
Application, Domain
Application control No Yes
File Type control No Yes
AV and AMP and
File Security AV and AMP
Sandbox
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 43
43
Policy Best Practices – with full SIG integration
• DNS Policy • Firewall Policy • WEB Policy
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 44
44
Policy example
Endpoint Location DNS CDFW SWG Note
Win10 PC HQ Yes No No Added layer to
existing security
(Network) (Phase2) (Phase2) stack
AnyConnect
Win10 PC Roaming Yes No Yes
SD-WAN
Win10 PC Branch Yes Yes Yes
Security Settings Source Tunnel Security Settings
AnyConnect
Source Trusted
Content Settings Content Settings
Protocol/IP/Port Network
Detection
Application Settings Application App. Settings
Destination
Selective Proxy Tennant Controls
Protocol/IP/Port
Putting it all together, focus on the snippet with Win10 PC for the sake of space
… now one thing we have not tackled still is the human touch, we have not spoken
about identity.
45
Deployment
Fundamentals
46
Deployment Checklist for DNS Security
https://learn-cloudsecurity.cis co.com/ umbrella-resources/ umbrella/deployment-checklist-for-d ns-securi ty-packages
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 47
47
Deployment Checklist for DNS Security
https://learn-cloudsecurity.cis co.com/ umbrella-resources/ umbrella/deployment-checklist-for-d ns-securi ty-packages
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 48
48
Deployment Checklist for SIG Security
https://learn-cloudsecurity.cis co.com/ umbrella-resources/ umbrella/deployment-checklist-for-sig-security-p ackages
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 49
49
Deployment Checklist for SIG Security
https://learn-cloudsecurity.cis co.com/ umbrella-resources/ umbrella/deployment-checklist-for-sig-security-p ackages
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 50
50
Deployment Checklist for SIG Security
https://learn-cloudsecurity.cis co.com/ umbrella-resources/ umbrella/deployment-checklist-for-sig-security-p ackages
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 51
51
Project Delivery
Keys to Success:
• Well Defined Scope
• What’s in-scope, and What’s not…
• “Scope creep” is common
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 52
52
Project Delivery
Keys to Success:
• Define Success at Project Start
• Provide Documentation
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 53
53
In-Scope Documentation
• Hig h Level Design (HLD) – Presents requirements and build details
• Statement Of Work (SOW) – Defines expectations and success criteria
• Defines Scope, Milestones, Deliverables and Customer vs. Partner Responsibilities
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 54
54
Deployment Planning &
Design
55
Deployment Planning
Information to collect
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 56
56
Create a Simple Matrix
Organize Information
Added layer to
No No
Win10 PC HQ Yes existing
(phase 2) (phase 2)
security stack
Added layer to
No No
iOS HQ Yes existing
(phase 2) (phase 2)
security stack
Cisco Security
iOS Roaming Yes No No
Connector
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 57
57
Solution Deployment Scope
Type S cope
In-Scope Traffic Types Example: Corporate – Branch – Roaming – Guest - Datacenter/Applications/Servers
In-Scope Device Example: Desktop – Laptop – VM – Kiosk – Mobile device (iOS, Android, Chormebook)
Types
Sizing Number of sites:
Number of users:
DNS queries per second:
Number of AD domains:
Number of AD groups for policy:
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 58
58
Module 3
Identity
59
Choosing the Right Identities
• In Umbrella an identity is essentially a traffic source
• Identities can be very broad, such as traffic originating from a public (NAT) IP address,
or very specific, like a user or private IP address.
• Which layers enforce • Which identity • Which Umbrella
identity ? surrogates does components are
Umbrella use ? needed?
- DNS : - DNS :
- DNS
- IP address –> User - Virtual Appliance
- AnyConnect/CSC
- WEB
- WEB:
- Cookie –> User - WEB :
- DNS and WEB
- IP address –> User - SAML IdP
- AnyConnect
60
Umbrella Core Identities –more often used
List of Umbrella Core Identities
C ore Identity Derived From Used For
N etworks Manual Configuration DNS, SWG
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 61
61
Umbrella Sites
Umbrella Tennant (“org”)
AD AD AD
AD AD AD
US EMEAR APAC
A method to logically separate identity components
and information within a single Umbrella tennant
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 62
62
Network Identity - Deployments > Core Identities > Networks
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 63
63
Tunnel Identity - Deployments > Core Identities > Tunnels
• A tunnel identity represents an
established, persistent connection
between your IPSec capable device and
the Umbrella cloud.
• When a tunnel identity is configured for
a policy, any web traffic egressing
through that tunnel may match the
policy.
• Such that any security or access control
policy components configured in the
policy will be applied to web traffic
egressing from the defined tunnel
identity.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 64
64
Internal Network Identity - Deployments > Configuration > Internal
Networks
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 65
65
Roaming Identity - Deployments > Core Identities > Roaming Computers
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 66
66
Cisco Security Client (Any Connect)
Entitlement is included for use with an Umbrella subscription
(excludes VPN functionality)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 67
Umbrella is integrated with the AnyConnect agent for both DNS and SWG. The
endpoint client is an all-in-one deployment method for Umbrella SWG. It handles the
traffic forwarding, traffic authentication and user authentication without any added
complexity or additional infrastructure. (AC Apex) is the license level but excludes
VPN functionality. The customer only needs one of two things: a SIG Essentials
subscription, or SIG add-on to their existing DNS subscription. This is a simple way to
secure internet access for roaming users.
67
Unmanaged mobile device protection
Umbrella is now able to protect any (modern) Android, Chromebook
or iOS device with DNS Security—without MDM
iOS
• iOS 14 or higher version
• Cisco Security Connector application installed
Android
• Android 8.0 or higher version
• Device with a camera or Firefox Browser installed
• Cisco Secure Client application installed
QR code
enrollment
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 68
68
DNS-layer security via Umbrella Chromebook
client INSIDE CHROMEBOOK
Apply Policies
View Reports
Admin
Manage Devices
Umbrella
Dashboard
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 69
69
Umbrella SWG support for Google Chromebooks
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 70
70
SAML User and Group Identities - Deployment > Configuration >
SAML
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 71
71
User/Group Synchronization
AD
AD Connector
1 2 Umbrella cloud
Actions : AD
Connector
• Register AD Server
• OpenDNS_Connector
Per Umbrella Site
Best Practice :
Policy UI
• AD Group Filter
• Account Exceptions
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 72
Once an AD server has been registered, ADC will be notified, and will
proceed to read out the Users, Gorups and Group Memebership information
This will now be visible in the umbrella Policy Configuratioi UI and you will
be ready to configure policies
72
On-prem AD-based DNS Identity Enforcement
AD
AD Connector
AD 1 2 Umbrella cloud
AD
AD
3
• AD Login events VA
• ADC sizing 4
• VA sizing
• Umbrella Sites for
scaling Note : Umbrella Virtual
DNS
Appliance is a conditional
requests
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial
DNS forwarder
73
73
On-prem AD-based WEB Identity Enforcement
AD
AD Connector
AD 1 2 Umbrella cloud
6
No login events needed
3
Forwarding :
Web traffic 4 5 SaaS
• IPsec
• PAC
• Proxy Chain
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial SAML 2.0 - IdP 74
BRKSEC-2037 74
74
Module 4
DNS
75
Where does Umbrella DNS fit? Malware
C2 Callbacks
Phishing
Benefits
First line Block malware before
it hits the enterprise
NGFW
Netflow Contains malware
Proxy if already inside
Sandbox Router/UTM
Internet access is faster
AV
AV AV AV AV
Provision globally in minutes
HQ BRANCH ROAMING
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 76
Umbrella + DNS:
- Umbrella can be the first layer of defense against threats by preventing devices
from connecting to malicious or likely malicious sites in the first place—which
significantly reduces the chance of malware getting to your network or endpoints.
- We use DNS as one of the main mechanisms to get traffic to our cloud platform,
and then use it to enforce security too.
- DNS is a foundational component of how the internet works and is used by every
device in the network.
- Way before a malware file is downloaded or before an IP connection over any port
or any protocol is even established, there’s a DNS request.
76
Let’s look now at the key features for Umbrella.
76
It all starts with DNS
Port agnostic
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 77
With Umbrella, it all begins with DNS — We use it as the main mechanism to get
traffic to our cloud platform for inspection.
Now everyone has probably heard of DNS, but lets level set on what it is, and why it’s
so important with Umbrella.
DNS is the domain name system, and it’s used to map domain names like cisco.com
to an IP address.
Think about when you want to call your friend or colleague. You’ll look up their name
in your contact list, instead of trying to remember everyone’s phone number. DNS
was developed for a very similar reason — so you wouldn’t need to remember the IP
address for every website you want to visit.
DNS is the first step in nearly all internet connections, and it’s used by all devices. So
with Umbrella, we’re trying in to something you’re already doing. Any time you click
on a link or type a URL for an external site, the request goes to a recursive DNS
service, like Umbrella, to look up the IP address.
So, Umbrella will resolve the DNS request, plus add security at the same time — all
77
without adding any latency. In fact, many customers report better internet
performance after switching to Umbrella.
77
DNS
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 78
78
Using a single global
recursive DNS service
Benefits ISP?
Enterprise
ISP1
Home location A
Global internet activity visibility users Internal InfoBlox
appliance
Remote Enterprise
sites Internallocation C
BIND server
ISP? ISP3
- Using Umbrella to resolve all external DNS requests allows our customers to see all
their internet activity from all their locations and networks globally.
- Because our security solution operates at the DNS layer using existing Internet
infrastructure, we can offer network security with zero added latency.
- Executing security at the DNS layer also enables consistent policy enforcement and
allows our customers to see which cloud applications are being used on their
networks.
79
DNS security
Visibility and protection for all activity, anywhere
HQ
IoT
• All office locations
BYOD • Any device on your network
On network
• Roaming laptops
Off network
• Mobile devices: iOS & Android
Branch
• Every port and protocol
Roaming
Managed
iOS devices
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 80
Umbrella provides visibility and protection for all of your internet traffic.
Specifically:
- We provide the visibility needed to protect internet access across all office
locations, all devices on your network, and roaming laptops.
- We provide visibility into sanctioned and unsanctioned cloud services, so you can
uncover new services being used, see who is using them, and identify potential
risk.
- As attackers try to infiltrate networks with different tactics, Umbrella also provides
coverage and visibility for all ports.
- As the internet moves towards HTTPS, more destinations will require SSL
decryption to effectively see and block. Umbrella provides visibility and protection
for HTTPS destinations, without adding latency.
80
Prevents connections before and during the attack
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 81
CLICK
- Stopping data exfiltration or the download of ransomware encryption keys
- C2 callbacks are blocked using the same DNS enforcement process described a
moment ago.
- And in the event that the malicious payload is designed to bypass DNS and use a
direct-to-IP connection, Umbrella goes beyond DNS to provide malicious IP
blocking and enforcement.
81
Gather intelligence and enforce security at the
DNS layer
Recursive DNS
Any device Authoritative DNS
root
com.
domain.com.
User request patterns Authoritative DNS logs
Used to detect: Used to find:
• Compromised systems • Newly staged infrastructures
• Command and control callbacks • Malicious domains, IPs, ASNs
• Malware and phishing attempts • DNS hijacking
• Algorithm-generated domains • Fast flux domains
• Domain co-occurrences • Related domains
• Newly registered domains
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 82
82
Here, an attacker has incorporated a DNS tunneling kit into an authoritative DNS
nameserver.
The attacker has also compromised a system and installed malware with a DNS
tunneling client.
The attacker issues an encoded command (“aop1”) that will tell the malware on the
compromised computer to collect credentials.
The command is added to the domain (“aop1.18-ququ.example.com”) and sent over
DNS.
The malware receives the command and collects the credentials.
The malware encodes them and sends them back over DNS. ("eui8")
83
Command and Control instructions
Free WiFi
83
Intelligent Proxy Overview
RESOLVE R PROXY
Inspects DNS Inspects header
REQUEST AND RESPONSE REQUEST AND RESPONSE
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 84
Let's just set a foundation of what the intelligent proxy is. It basically is consisting of
resolvers and proxies, and that proxy is really no different than what you'd find in any
cloud secure, secure-web-gateway service. That difference is that what makes it
intelligent is that the resolver decides what to proxy or not, what to just directly block
right at the resolver level. Now what you might be wondering though is how does the
endpoint, how does any endpoint know where it's going to send the web connection
to?
84
Application
Visibility & Control
85
Visibility challenge
Expectations Reality
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 86
86
Umbrella App Discovery and Blocking
Application
Settings
a1.com
b2.com
c3.com Link
Umbrella Log App Discovery Engine Category and
DNS logs ingestion Cloud App Security Index Application
Blocking
Discovered App detail/
Dashboard
apps grid risk profile
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 87
The Cisco Cloudlock App Discovery solution ingests DNS logs from your Umbrella
tenant and normalizes the data and then aggregates the data and runs it against the
Cloud App Security Index to identify the apps in use.
The results are presented in a variety of formats. The dashboard provides highlights
and key trend information. The apps grid starts with a list of discovered apps and
allows for a wide set of filtered and ordered views. Each app has a it’s own drill down
view that includes information on the vendor, usage and risk details.
87
Umbrella App Discovery and blocking
• The App Discovery reporting section will replace
the Cloud Services Report
• Additional application coverage (Cloud App Security
Index)
• More detailed information on the vendor,
app, certificates, and risk factors
• Ability to block a category of apps or individual apps
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 88
88
Dashboard
Visibility
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 89
The dashboard has a set of high level information to highlight key category, risk and
usage information.
89
Apps grid
Visibility
Optimization
and blocking
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 90
The apps grid provides the key data elements for each app and allows for a wide
variety of custom views.
90
App detail /
risk profile
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 91
The app detail pages contain a deeper set of information on the vendor, app and risk
attributes.
91
App Blocking
App Settings Screen
Optimization
and blocking
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 92
When you click on “Block this app” from the Apps Grid listings or App detail page you
are automatically linked over to the Policy page in the “Application Settings” section.
Once you select the policy you want to add this block to, it will show you this screen
and you simply have to click save to add this block to the policy.
92
Application visibility and control
Extends across enforcement points
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 93
• AVC isn’t unique to CDFW. With this change, AVC is extended for broader coverage.
• At DNS-layer, Umbrella provides visibility into cloud apps in use, helping customers
identify potential risk and block specific apps if desired
• SWG can block web-based apps at the URL level with granular control of app
functions
• CDFW complements this, extending AVC to non-web / non-HTTP(S) traffic. Such as:
• Apps not performing DNS lookup
• Apps that use hard-coded IP addresses
• Apps where signature-based detection (not based on IP/domain/URL) is
required to detect and block
• I shared examples on the previous page.
• Today, we can identify/block ~1000 apps (and growing)
• NOTE TO SE: Re: blocking apps… Some apps use web and non-web traffic (i.e.
Zoom). Today, to completely block Zoom, the customer would set that policy in
CDFW (to block non-web traffic portions) and in SWG (to block web traffic
portions). Ideally (and unified policy will get us there), the customer would set
policy for an app in one/only place, and Umbrella would decide where to execute
that. We’re heading there quickly!
93
DNS Deployment
Scenarios
94
Connecting to Umbrella
Roaming CLIENT/ANY CONN ECT Route traffic and IDs via DNS
No need for connectors/PAC files
Anycast routing
INTERNAL DNS OR DHCP Customers not tied to a data center
Umbrella
On-network NETWORK DEVICES
VA AND AD CONNECTO R
Customer
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 95
On-network coverage:
- You can protect all devices on your network – even those you don’t own – by
changing one setting in your network server, access point or router.
- Customers have several additional deployment options which provide more
granularity for administration – specifically for policies and reporting.
- Customers can use a lightweight DNS forwarder, deployed as a virtual
appliance, to embed the local IPs associated with the internet traffic so that
administrators know which internal network made the internet request.
- For even more granularity at the user level, Umbrella can be integrated
with Active Directory so that customers have control and visibility per AD
user or computer.
95
- If you use Cisco AnyConnect for VPN connectivity, you can use a built-in integration
to enable roaming security.
- If not, we offer a lightweight, standalone client.
95
The Simplest Way Protect on-network devices via
gateway’s DHCP
small branch offices with no internal
DNS server
Internet gateway
208.67.222.222
Your policy Network egress IP
Enforce all security settings for 67.215.87.11
67.215.87.11 DNS server
Default
208.67.222.222
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 96
• One IP change [CLICK] and every device behind your Internet gateway (e.g. router,
Wi-Fi AP, firewall, proxy) is instantly protected
• Because DHCP seamlessly provisions devices—even those you don’t own—to
forward DNS traffic to the Umbrella global network
• With this configuration, policy and reports will only identify the network egress’
public IP address, so you lack internal network, user or device granularity
96
Protect on-network devices via DNS server
Laptop IP
Internet gateway 10.1.1.3
Internal DNS Server
208.67.222.222
Server IP
Your policy Network egress IP 10.1.1.1
Enforce all security settings for 67.215.87.11 External DNS resolution
67.215.87.11 DNS server 208.67.222.222
10.1.1.1
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 97
• Larger networks often already point all devices to an internal DNS server such as
Windows or BIND
• Again, a single IP change will forward only external DNS traffic to the Umbrella
global network
• We do not replace it or impact any of your internal DNS resolutions
97
Protect internal networks via Umbrella virtual
appliance
Internal DNS Server
Server IP
Inserts 10.1.1.3, GUID and 10.1.1.1
Org ID in EDNS request,
encrypts and forwards
Laptop IP
Internet gateway 10.1.1.3
Umbrella VA
208.67.222.222
Appliance IP
Your policy Network egress IP 10.1.1.2
Enforce all security settings for 67.215.87.11 DNS server
10.1.1.3 DNS server 10.1.1.1
10.1.1.1 Internal domains
office.acme.com
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 98
98
Protect AD users via Connector and Umbrella virtual
appliance
AD Server
w/AD connector
Associates
CEO with
EXEC group Associates CEO
(via HTTPS with 10.1.1.3
push) Internal
Internet gateway
Umbrella VA DNS Server
208.67.222.222
Appliance IP DHCP IP
Your policy Network egress IP Inserts 10.1.1.3, 10.1.1.2 10.1.1.1
Enforce all security settings for 67.215.87.11 GUID and Org ID DNS server
in EDNS request, 10.1.1.1
EXEC group DNS server
encrypts and
(GUID = CEO, a member of EXEC group) 10.1.1.1 Internal domains Laptop IP
forwards office.acme.com 10.1.1.3
CEO
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 99
• In addition to our virtual appliance, you can have even greater granularity by using
our Active Directory (AD) connector
• Our Connector enables you to pinpoint infections by AD computer or user name,
or set policies by AD group membership, instead of internal subnets and IPs
• Deploy this auto-updated, read-only software on an Active Directory domain
controller or a separate Windows server domain member
• The Connector syncs only the user and computer group memberships to our
service under just your account using HTTPS
• When users authenticate, it also tells our VA the AD user, AD computer and the
internal IP of the device where they authenticated from
• When devices make DNS requests, the VA, which can see its internal IP, can now
insert the AD user and computer name to
• We do that using a globally unique identifier, which gets translated back into the
real AD user or computer name in our dashboard
99
Protect off-network Win/Macs via Umbrella roaming
client
208.67.222.222 or
Embed unique device ID
and GUID (if AD) in EDNS
Your policy Network egress IP request, encrypts and
Enforce all security settings based on N/A forwards
User identifiers DNS server
N/A
Umbrella
roaming client
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 100
100
Protect on and off-network Chromebook devices
via Umbrella Chromebook client
Umbrella
Chromebook client
Internet gateway
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 101
• For Chromebook devices, we have the Umbrella Chromebook client that provides
DNS-layer protection both on and off-network.
• It provides a way to identify which customer and user sent the DNS request. It can
be deployed across the organization to get granular control & visibility for the
internet activity of Chromebook users.
101
Protect on-network devices using Cisco ISR*
208.67.222.222
Your policy Network egress IP
Enforce all security settings for 67.215.87.11 SERVER VLAN
Workstation VLAN Workstation VLAN
DNS server
or 208.67.222.222
Server VLAN Sever VLAN
DNS server
208.67.222.222
YOUR NETWORK
*Supported models: 1K and 4K series running OS-XE v16.6.1+
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 102
102
Protect on-network devices via partner network
device
Internet gateway
208.67.222.222
Your policy Network egress IP
Enforce all security settings for N/A
FGL189914GG DNS server
208.67.222.222
Supported Serial Number
FGL189914GG
+Custom
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 103
103
Overview
• Cisco SD-WAN (Viptella)
- Cloud-delivered WAN architecture that
enables digital transformation
- Manage connectivity across WAN from Internet/SaaS
a single dashboard
- Connect to SaaS and IaaS platforms Umbrella
with speed, reliability, security and
cost-savings
• Quickly deploy Umbrella across SD-
WAN to hundreds of devices DIA
• Create policies and view reports on Data Center SD-WAN fabric Branch
a per-VPN basis
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 104
104
Protect guest wi-fi using Cisco WLC
No support for internal or split domains
Not recommended for employees
208.67.222.222
Your policy Network egress IP
Enforce all security settings for 67.215.87.11 GUEST WI-FI SSID
Employee Wi-Fi SSID Employee Wi-Fi
SSID DNS server
208.67.222.222
Guest Wi-Fi SSID
DNS server
208.67.222.222
YOUR NETWORK
*Supported models: AireOS 8.0+ and WLC 8.4+
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 105
105
Protect corporate and guest wi-fi
208.67.222.222
Your policy Network egress IP
Enforce Umbrella security settings per 67.215.87.11 GUEST WI-FI SSID
SSID or using Meraki Group Policies Employee Wi-Fi
SSID DNS server
208.67.222.222
Guest Wi-Fi SSID
DNS server
208.67.222.222
YOUR NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 106
106
Integration features
• Appends EDNS (Device ID and
Client IP) to the DNS packet
• Local domain bypass support
to exclude internal DNS requests
from being sent to Umbrella
resolvers
Umbrella SD-WAN
• Supports DNSCrypt proxy
to encrypt DNS traffic
Powered
by Viptela
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 107
First, EDNS info (including the Device ID and Client IP) will be appended to the DNS
packet which allows Umbrella to enforce the right policies for the right devices
(Device ID) and provides visibility in the Umbrella dashboard (Client IP).
Second, the integration supports local domain bypass to exclude internal DNS
requests from being sent to the Umbrella resolvers. This allows users to reach your
network’s local resources (computers, servers, printers, etc.) on internally -hosted
domains that rely on local DNS servers.
Lastly, the integration includes support for DNSCrypt. This encrypts DNS traffic to
secure DNS traffic from eavesdropping and man-in-the-middle attacks.
107
Umbrella DNS Policy
Best Practices
108
Build Policy From the Bottom Up
• Your default policy (at the bottom of your list of policies) is the catch-all for
identities you haven't defined a specific policy for.
• Try
to make your default policy the one you want to be enforced if an
unknown or unexpected device or user attempts to access the internet.
• As
such, we recommend that you always either make your default policy the
most restrictive or make your default policy the one that you would want the
majority of your users and devices to be governed by.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 109
109
Build Additional Policies as Exceptions
• From our base default policy, you want to layer on policies from least to most specific.
• An example of this might be to make your first additional policy be for "All Roaming
Computers", then layer another policy on top of that for a small number of roaming
computers that have slightly different needs than the general population of roaming
computers.
• By taking this "exceptions-based" approach you are less likely to encounter any unintended
results.
• Example:
• 1. File Sharing Access
• 2. HR Access
• 3. C Level Access
• 4. Citrix Policy
• 5. Default Policy
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 110
110
Additional Best Practices
• Use Top Level Identities
- Top-level groups like "All networks" and "All Roaming Computers" are special
because they dynamically inherit new identities.
- New devices using the top level will automatically have policy applied.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 111
111
Module 5
CDFW
112
Umbrella firewall protects traffic from requests
originating from a client user
Internet
Request originating
Firewall use cases that from the internet
protect traffic from requests
originating from a client user
are essential to securing access
to the internet and controlling Request originating
from client user
cloud app usage
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 113
• Although the speaker should not emphasize use cases where requests
ORIGINATED from the internet, here are examples that are not the focus for
Umbrella. ==> This is useful because it shows how cloud-delivered firewall like
Umbrella can complement on-premises firewalls.
• Inbound traffic via VPN
• Traffic between locations, i.e. branch office to brand office
• WAF (Web Application Firewall) - Shield is placed between the web
113
application and the Internet. Akin to a reverse proxy, protecting the server
from exposure by having clients pass through the WAF before reaching the
server
• DMZ / NAT – Creating a buffer zone (or demilitarized zone/DMZ) between
the public internet and the private network to screen inbound traffic
before it reaches an organization’s servers. .
113
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 114
114
• In LA now, the cloud-delivered firewall
provides layer 7 application visibility
and control (AVC).
• We had layer 3 / 4 firewall, but layer 7
AVC goes further to recognize non-
web applications and take appropriate
action to block/allow them.
• It uses signature-based detection to
identify and block applications.
115
• Customers forward traffic to CDFW by
configuring an IPsec tunnel from a
network device.
• Essential for delivering CDFW is
Umbrella’s innovative, patent-pending
IPsec tunnel approach – that
simplifies deployment and improves
reliability.
• It enables the Umbrella
infrastructure to execute
planned updates, additions,
and removals—even take
down an entire data center—
with minimal impact to users.
• And in the rare instance of an
unplanned interruption, it
performs automatic data
center failover with no loss of
115
redundancy protection.
• As new tunnels are created,
Umbrella automatically applies
security policies for easy setup
and consistent enforcement.
• Umbrella CDFW also forwards traffic
from ports 80/443 to our secure web
gateway for deep inspection of that
web traffic.
115
Reserved egress IP Internet
(SaaS app)
IP allow-listing
Use case: Allow listing
• Customer uses SaaS app that requires an “allow list”
• Examples: Government portals; Azure web apps NATaaS
Customer value
• Provides extra privacy and security Umbrella SWG
Functionality
• Unique egress IP for web traffic
• Single-tenant IP address per datacenter (1:1)
• Not shared with other customers
• No customer configuration required
Currently full support for tunnels
• Egress IP available in activity search only*
• Failover DCs also require reserved egress IPs Anycast forwarding on roadmap.
Branch
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial * Review speaker notes for detail 116
• *Tunnel support is easy for failover and predictive. Customers much purchase
additional reserved Ips for tunnel failover locations. PAC use with Reserved IP
works but it not sticky and thus not reliable or supported. Review Load balancing
slide for reason: LB could send a PAC user or Secure Client user to any DC, it is less
predictive.
116
• For roaming computers, a client VPN should be used to forward web traffic to a
network where an IPsec tunnel has been established to an Umbrella datacenter
provisioned with a reserved IP.
• Anycast will be supported by Reserved IP in a future iteration.
In the Activity Search report, there are three new filters in Advanced Search:
Umbrella Egress IP Type: A selection list of either Shared or Reserved.
Umbrella Egress IP Address: The field accepts specific egress IPs.
Umbrella Egress Data Center: A selection list of available Umbrella data
centers.
116
Cloud-delivered Firewall - CDFW
Best practices and considerations
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 117
117
Tunnels
118
Animation
Availability
• Hard code primary, secondary (optional)
• Failover to secondary data center is
handled by anycast
• Failure detection uses IKE dead
peer detection
Branch
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 119
Umbrella IPsec tunnel capacity is now at 250mbps and will be increased to 500 mbps
soon. Speed is IMIX tested. Multiple tunnels can be used to cover locations with
higher traffic volumes in the short term but individual tunnel capacity will continue to
be increased over time.
When setting up the tunnel you select your primary and secondary data center. If
there is an issue with your primary location it will automatically switchover to the
secondary location.
• If using DPD min of 30 sec intra DC, (intra region 1 min, inter region 2)
Note: inter and intra region times are due to BGP reconvergence.
119
Multiple Tunnels
• Higher throughput with ECMP
Umbrella
• ECMP all tunnel to the same DC
146.112.83.8:4500 146.112.83.8:4500
• Single public IP address supported T
u
T
u
with NAT n n
n n
• FQDN IKE identity if single public IP 1.2.3.4:11111 e
l
e 1.2.3.4:22222
l
1 2
• One IKE identity per tunnel Loopback1 Loopback2
10.0.0.1/32 10.0.0.2/32
Router
Most routers don’t use a random UDP source port for each IKE/IPSec over UDP
connection and due to this limitation the router is not able to identify to each tunnel
the traffic belongs to, NATing is used to generate random UDP port (different source
port) for each tunnel
120
Umbrella for SD-WAN
Fast forward time to value with automated security
Simplified management
Single pane of glass across all offices, users DIA
The Cisco SD-WAN and Umbrella integration enables you to simply infuse effective
cloud security throughout your Cisco SD-WAN fabric. Umbrella delivers multiple
security capabilities in a single cloud-delivered service to create a powerful,
integrated, and cloud-native security solution that is easy to deploy and to manage.
To get started, customers can quickly deploy cloud security across their SD-WAN to
thousands of branches in minutes and instantly gain protection against threats on the
internet — powered by Umbrella’s global network and threat intelligence. With
simple tunnel creation to Umbrella’s secure web gateway and cloud-delivered
firewall, customers get additional security and more granular controls.
Flexibility: deploy effective cloud security across your all Secure SDWAN platforms
121
( vEdge and cEdge)
Simplified management via the Cisco Umbrella dashboard: single pane of glass
into all of your security across branch offices and users
Built in redundancy- protection from regional DC failure without added complexity
121
Meraki MX and Umbrella integration options
Option I Option II
Meraki dashboard and user interface Choose per site Auto VPN extends Meraki’s SD-WAN
simplify tunnel creation fabric into the Umbrella cloud
Internet/SaaS Internet/SaaS
Cisco Cisco
Umbrella Flexible security options Umbrella
Meraki Umbrella
S D-WAN Connector
DNS Proxy SIG
e.g. guest traffic e.g. critical traffic DNS Proxy SIG
e.g. guest traffic e.g. critical traffic
Automated SD-WAN
fabric integration SD-WAN fabric
Competitive
MX
IPS/AMP
differentiator MX
IPS/AMP
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 122
Now, we are making available Option II (Phase II), which leverages the
Meraki Auto VPN to extend Meraki’s SD-WAN fabric into the Umbrella
cloud with just a few clicks. As new tunnels are added, Umbrella policies
are automatically applied for easy setup and consistent enforcement.
Meraki’s dynamic policies and intelligent path selection with auto load
balancing maximize performance and reliability.
Customers can mix and match Option I & II as it makes sense in their
environment. Both options of Meraki MX and Umbrella integration provide
simple, flexible deployment and enforcement options to meet customer needs.
122
As compared to our competitors, Cisco offers customers with the flexibility to
pick and choose security to support different use-cases. For example, they can
leverage Umbrella SIG capabilities with this integration to support use-cases
where they need full logging and inspection, e.g., corporate traffic. They can
also choose to deploy DNS-level security (with separate license, it is NOT
enforced with this integration) for non-tunnel sites (DNS security is excluded
from the tunnel) to stop attacks and block threats even before they reach their
network or endpoints, e.g., to protect guest wi-fi and high-performance
sites. Protected guests and high-performance sites requires licensing if using MX
(Meraki ADV license).
For Option I:
Availability
• Umbrella-defined primary, secondary DCs
• Failover to secondary DC and DR is handled by anycast
• Failure detection uses IKE DPD
• Available in all SIG datacenters globally
High availability
• Customer-defined primary and secondary DC (initially in select SIG DCs)
• Failover to secondary DC is handled by the Meraki SD-WAN fabric
Firmware: Requires MX14 or higher firmware
Licensing: Requires Umbrella SIG licensing + any MX license tier
122
VPN exclusions at app level requires SDW license for MX
122
Meraki and Umbrella
Pulling it all together for a highly flexible SASE
All allowed web traffic
Umbrella
DNS direct
DNS
All traffic
SIG
CASB IPS DLP RBI
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial * SDW License required for excluding traffic by application 123
123
Want to learn SASE?
dcloud.cisco.com
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 124
124
Intrusion Prevention
System
125
UMB SIG
DLP
OR
CASB
Bad
driven traffic
• Use signature-based detection (Snort 3) to examine
Internet
network traffic flows & p revent Exploit-facing signatures
and Vulnerability-facing signatures
• Automated actions, such as drop malicious packets, block
Si g n a tu re -b a s e d d e te c ti o n
Intrusion Prevention - Or -
System (IPS) traffic from the source address, reset the connection
An o m a l y -b a s e d d e te c ti o n
• Add layer of detection/blocking for malware, botnets,
phishing, and more
DEVICES ON
NETWORK
• Leverage Cisco Talos’ 40K+ signatures (and growing) to
detect and correlate threats in real-time
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 126
IPS - Requirements
Internet/SaaS
Umbrella
Tunnel (IPsec)
DEVICES ON NETWORK
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 127
127
IPS - Configuration
Under IPS Settings, choose one of the Intrusion System Modes:
• Detection Only—Detect threats or attacks in your network that match your signature database. When
Detection Only mode is used, your IPS settings can be tested on your network without affecting
traffic. Signatures that would be blocked in Protection mode will be logged in Activity Search as
"Allowed (Would Block)" under IPS Signatures.
• P rotection—Protect your network from known threats or attacks.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 128
IPS - Configuration
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 129
IPS - Reporting
• On the A ctivity
Search Report you
can filter by
using the Req uests me
nu in the upper-right,
choose IPS request
types.
• IPS—Can be further
filtered by Signature:
Log Only, Would Block,
or Blocked.
tunnels.
• Currently is only possible to use pre-defined Talos
signatures (40,000+)
• Recommended to start the implementation of IPS in Internet
"Detection mode" and review the IPS events (using the
Hit Counters or Activity Search) before switching to
"Protection mode" Si g n a tu re -b a s e d d e te c ti o n
132
Umbrella FE Labs
1. DNS Network Protection
2. DNS Branch Protection
3. Active Directory Integration
Day 1
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 133
133
‣ Widget Maker with R&D, Sales,
Marketing and Executives
134
Course Logistics & Materials
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 135
135
Confirm access to Cisco Security Workshop
bit.ly/umb101
UMB101-OnDemand
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 136
136
dCloud: Cisco Umbrella Lab v4:
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 137
137
Accessing the Lab Guide
Visit: bit.ly/umb101
1. Click Create New Account
2. Fill out the form using the enrollment code
UMB101-OnDemand
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 138
138
Accessing the Lab
The screen below appears after registration. Look for an email to verify your email
address.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 139
139
Accessing the Lab
Open the email generated from registration to verify your email address
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 140
140
Accessing the Lab
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 141
141
Accessing the Lab
• After validating your email address go back to the following link to access the
module: bit.ly/umb101
• You will be directed to the page below. This is your lab guide to be used
for the Umbrella 101 Lab.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 142
142
Proof of Performance
• In order to receive credit for
Fire Jumper you must
complete all lab modules.
• After completing the lab, you
will be provided with a
certificate which is your “proof Ted Lasso
of performance
• Formal Firejumper Certificates
will be provided at a later date
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 143
143
144
Cisco Umbrella 101
Field Engineer Course
Firejumper Stage 3 Deployment Training
145
Umbrella 101 Field Engineer Course Outline
• Module 1 – Fundamentals • Module 6 – SWG
• Module 2 – Deployment • Module 7 – Advanced SWG
Module 3 – Identity Module 8 – Investigate
Day 1
Day 2
• •
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 146
146
Umbrella FE Labs
1. DNS Network Protection 9. Secure Web Gateway
2. DNS Branch Protection 10. CASB / Cloud Malware
3. Active Directory Integration 11. Data Loss Prevention
Day 1
Day 2
4. Roaming Device Protection 12. Remote Browser Isolation
5. Virtual Appliances 13. Operations & Troubleshooting
6. SIG Network Tunnel 14. Investigate
7. Cloud Delivered Firewall 15. APIs & Integrations
8. Intrusion Prevention System 16. SecureX
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 147
147
Project Status Review
148
Current Project Status
• We have:
- Deployed Umbrella DNS @ HQ
• Configured & Tested Manual Integration & DNS Server Forwarding
- Deployed Umbrella DNS for Roaming Devices
• Configured & Tested Cisco Secure Client
- Deployed Umbrella DNS @ Branch
• Configured & Tested Network Device Integration
- Deployed Active Directory & Virtual Appliances
- Migrated Umbrella DNS to SIG @ Branch Migrated
• Configured & Tested a Network Tunnel
• Configured & Tested CDFW & IPS We are now able to assist TME
Labs with the continuation of their
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 149
Umbrella Deployment Journey.
149
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 150
150
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 151
151
Module 6
SWG
152
Umbrella SWG Internet/SaaS
Multiple functions and SaaS app
e.g. O365
aggregated reporting in
one cloud console Direct
Umbrella SIG Essentials includes a broad set of Secure Web Gateway (SWG)
capabilities. Once your web traffic is routed to the Umbrella cloud the SWG can
provide URL level reporting to help with monitoring usage or for investigations.
Application visibility and control give you the ability to see what apps are being used
and how much. It also provides risk profiles and the ability to block app categories or
specific apps. You can even control specific actions within applications. Umbrella
provides anti-virus/malware scanning and additional sandboxing capabilities as well.
You can turn on full or selective decryption capabilities to secure HTTPS traffic and
you can enforce file type controls. If you have time sensitive O365 traffic you can
send it directly to Microsoft. (Cisco Cloudlock can enforce API-based CASB security
measures on that traffic as appropriate.)
Umbrella combines all of this functionality and reporting along with DNS security and
a Cloud Delivered Firewall (CDFW) capabilities in a single cloud console.
Re: Direct to SaaS app – This is O365 bypass, with which you can bypass SWG
inspection and still benefit by using our direct peering. To enable it, customer
requests it in the backend by opening a support ticket.
153
Why a Web Proxy?
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 154
DNS can show you which building a user walks into, but DNS cannot show you where
the user goes in the building, who they talk to or interact with. For that you would
need URL visibility (and HTTPS inspection now that most of the web is encrypted!)
154
Don’t we already do this with DNS?
• The difference is “URL” filtering
• Anatomy of a URL
h t tps://video.google.co.uk:80/videoplay?docid=-7246927612831078230&hI=en#00h02m30s
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 155
https://doepud.co.uk/blog/anatomy-of-a-url
Umbrella DNS could be set to block Google, but not this URL
Umbrella DNS can block Amazon, but not video.amazon.com
155
Full URL tracking and reporting
• Visibility for compliance,
monitoring, and investigations
• Multiple views at the URL level
by network, device, user, date
- See trends
- Monitor activities
- Investigate incidents
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 156
The Umbrella secure web gateway has visibility into all web traffic and provides
detailed URL level reporting. This information can be used to monitor specific
networks or users and provide detailed data for investigations.
156
SWG Rules-based Policy
Evolution of Umbrella’s Policy Model
• Rules
• All identities: Users, Groups, IP, Tunnels, etc.
• All Actions: Block, Allow, Warn
• Destinations: Categories, Destination Lists,
Applications (AVC), Security
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 157
157
Category blocks are a great way to do broad brush content control by blocking a large
number of URLs at once. The broad set of main categories are from Cisco Talos and
these are shared across multiple Cisco security solutions.
SWG policy – Block Uncategorized
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 159
159
SWG Policy - Warn Page
• Soft Block/Warn
• SWG Support Only (Further
support planned for later)
• Simple Continue Button
• Customizable
• Content Categories
set to Block or Warn
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 160
160
SWG Policy - Time of Day/Week - Selection
within Rule
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 161
161
Malware and virus protection
• Scan and detect a broad range
of malware and viruses to avoid
infection and stop attacks
• Umbrella secure web gateway
with Secure Endpoint (AMP)
and third-party virus protection
tools
• Activity reports show
details on all blocked
events
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 162
The SWG scans all web traffic (including HTTPS) for viruses and malware utilizing the
power of AMP and multiple anti-virus engines. All of the details of the blocked
destinations are provided in the Umbrella reporting console for tracking and
investigations.
This inline protection blocks access to malicious destinations and files that are part of
active threats.
162
Cisco Secure Malware Analytics
(Threat Grid) sandboxing
SIG Essentials: Cisco Secure Malware Analytics limit of 500 files per day
SIG Advantage: Includes unlimited submissions and access to the full sandbox console for 3 users
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 163
For file that make it through the Cisco Secure Endpoint malware scan and are in a
higher risk category are sent to the Cisco Secure Malware Analytics (Threat Grid)
sandbox for further analysis. This allows for the deeper inspection of the file over
time to see if it starts to display malicious behavior.
SIZING GUIDANCE: If there are over 10k users the file limit should be discussed. 1-3%
of total user count is a good guideline and should meet most customer’s needs.
Umbrella Cisco Secure Malware Analytics (Threat Grid) entitlement dashboard can be
tied to an existing Cisco Secure Malware Analytics (Threat Grid) install for customers
that already have Cisco Secure Malware Analytics (Threat Grid) licenses.
Additional volume is available through an add-on SKU
163
File Type Control
• Blocking file downloads by type
• File Detection on a combination of
• File Extension
• File Signature
• SWG support only
• Over 100 different file types supported more being added
• Users get block page for blocked extensions
• SSL Decrypt Encouraged
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 165
165
Extending SWG
Functionality
166
General CASB types (multimode)
Inline/ proxy Out of band / API
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 167
There are two ways to provide CASB functionality. There are a set of pros and cons to
each.
Out of band: which means that the activity goes from the user directly to the SaaS
provider and then through an API connection the CASB applies policy to provide
visibility, protect the user or control their activity.
Inline: means that traffic to the SaaS provider is intercepted and scanning/policies are
applied before it reaches the SaaS provider.
Umbrella provides some inline CASB capabilities now and Cisco Cloudlock provides a
set of API-based capabilities.
167
Tenant controls
Select the instance(s) of core SaaS applications that can
be accessed by all users or by specific groups/individuals
Cisco.com
Corporate instance
Deb Smith
Personal instance
Bob Jones
Personal instance
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 168
• Cloud Access Security Broker (CASB) is another key functional area and getting
more and more integrated into Umbrella – Tenant Restrictions is key
• You may have Office 365, Slack or Gsuite or some SaaS applications where you
only want your corporate instance being used. Don’t want people exfiltrating data
– sensitive information or files -- out to their personal instance of Gsuite (for
example)
• Can do that within Umbrella now
• Variety key use cases – of course there’s the security use case I just mentioned but
there’s a productivity angle as well.
• You want people to use sanctioned corporate SaaS apps to boost their productivity
but don’t want them on personal instances doing other things during working
hours
168
App discovery and controls
Visibility into shadow IT and control of cloud apps
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 169
Umbrella is now exposing Shadow IT and helping organizations enable healthy cloud
adoption with new App Discovery and blocking capabilities.
• There are three key challenges that we are addressing to help expose and manage
Shadow IT. The first one is visibility, How can you develop a cloud adoption
strategy and manage risk if you don’t even know what applications are in use?
• Visibility is the critical first step, but it isn’t enough on its own. A list of apps is
interesting, but with hundreds of SaaS apps in use at most organizations, the
security and IT team need “App and risk insight” help understanding the vendor,
app, and risk details to make informed decisions and actively manage cloud
adoption.
169
• Overall this visibility and control can help you manage cloud adoption by
optimizing productivity, controling cloud expenses and reducing the risk to the
organization.
169
Malware scanning is API-based, cloud to cloud
Unmanaged
users
APIs
Unmanaged
devices Cisco
Umbrella
Unmanaged
network
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 170
170
Data-at-rest, cloud malware detection (API-based)
Prevent malware from spreading to additional endpoints and users
© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 171
There are a variety of ways that malware can get into cloud storage environments.
Unprotected endpoints, unmanaged devices and external sharing.
Our cloud malware detections functionality can both scan the exiting repository and
scan new file uploads for malware to keep your repository clean and prevent the
downloads of bad files to other endpoints.
Currently four apps are supported, as we add more apps SIG Adv will include them
automatically. See Icons for supported apps
171
SSL Decrypt
173
Why inspect HTTPS?
• Most of the web is now HTTPS
• What is visible in HTTPS without inspection?
- Server Name Indication (SNI)
- Source and destination IP addresses
- Server FQDN (from the server’s certificate)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 174
With the increasing amount of web traffic that is encrypted now it’s important to
decrypt and apply policies to this traffic.
174
HTTPS traffic and URL visibility requirements
• Granular app control
• URL category blocking
• Full URL visibility/reporting
• AV scanning, file reputation and sandboxing
• Block page rendering
• Basically anything that can’t be accomplished
at the DNS layer
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 175
This deeper level of visibility is required to do granular app controls, URL level
functionality as well as file scanning/sandboxing and block page rendering.
175
Customer Signed Certificate Authority
• Support for customers’ signed
certificates for SSL Decryption
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 177
177
Web policies requiring decryption
• HTTPS blocking and monitoring
• Advanced application control
• Upload blocks, posts, shares, attachments
• SWG SAML for user granularity in SIG tunnels
• XFF Proxy Chaining for internal IP
• File type controls (block on certain extensions)
• File analysis
• AMP and AV
• ThreatGrid Upload
• Tenant Controls
• Warning pages
• Remote Browser Isolation (RBI)
• Data Loss Prevention (DLP)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 179
179
How do we get traffic
to SWG?
180
AnyConnect Roaming (no standalone module)
Off network
HTTP CONNECT cisco.com:443 SWG
N
A • AnyConnect module redirects all TCP 80/443 traffic.
T • Traffic is sent in the form of explicit proxy requests.
On network • Identity is included in the requests.
Pros Cons
• Protects clients on and off network • Requires software management
181
AnyConnect Selective Enable/Disable (Limited
Availability)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 182
Well, the problem was that it enabled SWG for all users at the same time because it is
a global config. This became problematic when customers wanted to enable SWG for
POC.
This makes it hard for customers who want to test SWG on a small number of
computers and get their configuration right.
To control the rollout of SWG a user would also have to use GPO/script options to
disable the service as desired….which customers find ”undesirable”.
182
This feature is primarily designed to help users with testing the SWG solution on a
smaller subset of their Roaming Computers before they perform a full rollout.
How to?
Configuration
The option will be available on a per-Roaming Computer basis in the 'Deployments >
Roaming Computers' page.
The setting can be enabled on one or more computers by using the check -boxes on
the Roaming Computers page. It's possible to enable this on up to 100 devices at
once which is the maximum number visible on a single page.
The status of the setting is also visible when expanding the status of a single Roaming
Client
NS
182
Best Practices- Anyconnect
• Recommended version for Anyconnect SWG deployments is at least 4.9 MR4 (4.9.04053)
• Confirm that the updated Umbrella IP ranges are permitted on the network from where AC SWG
connection is established.
• For bandwidth intensive or critical business apps/sites that require to exclude traffic from proxy
you can configure External Domains under Deployment/Domain Management
• I n ternal domains – Applies to DNS and SWG
• E xternal domains – Applies to SWG only
• Support to bypass IPs under domain management
• Enable of Trusted Network Detection when require to move AC SWG to standby state on -network
• Enhanced AD user identity for Anyconnect SWG 4.10.00093
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 183
https://support.umbrella.com/hc/en-
us/articles/360044123751-Disable-Umbrella-on-Trusted-
Networks-Protected-Network-Disable-for-Enterprise-
Networks
183
PAC file
N Trusted
A HTTP CONNECT cisco.com:443 SWG source
T network / IP
On network • Client reaches out from a network defined in the Umbrella organization.
• PAC file is returned with internal networks already defined to go direct.
• Other infrastructure URLs are also pre-populated to go direct.
• Explicit proxy requests go to proxy.sig.umbrella.com.
• Requests are again validated against the defined networks in the organization.
• TLS tunneled over HTTP.
Pros Cons
• Well-worn and tested technology • JavaScript knowledge required for customization
• URL can be deployed via DHCP, GPO, DNS, etc. • Only works for management endpoints
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial • Not all apps honor PAC files 184
Once the browser has consumed the PAC file, it can start making “explicit” proxy
requests
-”Forward” proxy requests (vs. “transparent”)
-Simply means the client knows about the proxy
Those requests are again validated against the trusted source networks configured in
the dashboard.
In an explicit HTTPS proxy request, the TLS tunnel is sent over HTTP.
-What does that mean exactly?
-Let’s look at some brief proxy fundamentals
184
IPsec
N
A IPsec TCP/UDP
SWG
T
On network
Competitors like zScaler offer GRE (no encryption) and charge extra for IPsec.
-IPsec also offers dead-peer-detection which helps us with failover.
185
Identity for SWG
190
User attribution and authentication
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 191
IP Surrogates requires you can see the internal IP - this is available for Tunnels and
Proxy Chaining, but not PAC file or AnyConnect.
191
Multiple user attribution from single host
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 193
Historically customers using VDI environment with Umbrella DNS based protection
could not see WHO behind the shared host was making the webpage request.
However with SIG you can use SAML and Cookie surrogates to identify that user1 is
going to a website blocked by corporate policy.
The cookie is typically active for the time the VDI is used and removed when the VDI
session ends.
193
Web Policies
194
The Big Picture
Rules
Rulesets
Global
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 195
Global Layer will be where customers define settings, defaults and configurations that
have global effect
Rulesets will be logical containers where global settings and defaults can be
overridden for a set of rules
Rules define access control, and when or what security is applied
Policy destinations will be migrated to rules: content categories, destination lists, and
application settings
Policy settings will be migrated to “global settings/defaults”
Policies will be migrated to rulesets
195
Policies vs. Rules
• Policy matches on identity, rules match on identity and destination
• Policy applies actions in a hard-coded order of operations, a
matched rule applies the action it is configured for; rules can be
ordered to achieve the desired behavior
• Policies must be cloned for per user/group exceptions, rule
exceptions can be achieved by adding and/or reordering rules
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 196
196
The Anatomy of a Rule
• Priority (rule order)
• Action
• Identity (source)
• Destination
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 197
197
Rule Identities
• Users
• Groups
• Computers (with AnyConnect)
• Internal Networks
• Tunnels
• Networks (egress IP)
• Special “all policies identity” during interim state
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 198
198
Identity Order
• Users
• Groups > Users
• Computers
• Tunnels > Internal Networks
• Networks > Internal Networks
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 199
199
Rule Priority
• Rules are evaluated top-down
• Changing rule position changes rule priority
• Rule match applies the rule action, stops rule processing
• Every transaction is evaluated against the rule stack
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 200
200
Rule And Policy Interaction
• Policies are matched prior to rule matching
• Once a policy is matched, only the rules within the policy are
evaluated
• Any transaction that does not match a rule will be “implicitly allowed”
as per the legacy policy behavior
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 201
201
Taking Action
• When a rule is matched, one of the actions is applied:
• Allow > grants access to the requested URL but blocks if any security
category is matched or file scanning detects malware
• Block > presents end-user with a block page
• Warn > provides end-user with “warn page”
that will Allow if clicked-through
• Warn leverages a browser cookie to set
warn status on domain
• Currently destination lists only can apply
Allow or Block actions
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 202
202
Apply Security, or Not Apply Security?
• Apply action has a unique override setting which will Allow access to
requested URL without observing security categories or file
inspection verdict
• Use cases for security override:
• Emulate legacy policy behavior of “explicit
allow”
• Work around false positives
• Investigate security blocks
203
Example Web Policy
Ruleset = match all roaming computers
Default allow
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 204
Ruleset is like a “container” of rules, there is one match for going inside the
“container” and matches for specific rules, can be used as AND condition “network
identity (ruleset) and user (rule)”
Rules should match source and destination
Hidden default allow all in the end of each ruleset
204
Example Policy View
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 205
205
Umbrella policy tester
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 207
207
Module 7
Advanced SWG
208
Remote Browser
Isolation (RBI)
209
UMB SIG
DLP
OR
CASB
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 210
210
RBI Integrated in Web Rules
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 211
211
Animation
SIG
RBI traffic flow overview DNS CDFW RBI SWG NAT
CASB
Isolation
platform
SWG File inspection
(AMP/TG)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 212
Client – Mention only browsers are supported. Other apps (ie Facebook for iOS) will
not be isolated
File inspection occurs if user downloads file. Call out file download options (cleaned
PDF or file format stripped of macros)
Supported file types for download and action taken are listed here
https://support.umbrella.com/hc/en-us/articles/360060113992-Cisco-RBI-Remote-
Browser-Isolation-Supported-Formats-for-Document-Isolation
Encrypted archives are supported. They are extracted into the RBI platform and you
are able to download out a specific file from the archive.
212
What can be isolated?
• Browser traffic only.
- User-agent based filtering in Umbrella proxy.
- Umbrella: Non-browser traffic ==> Allow with security
• Examples:
- Isolating an image loaded by page which is not isolated is not possible.
- Isolating an app action without isolating the app is not possible.
© 2021 Cis c o and/or its affiliates . All rights res erv ed. Cis c o Confidential
213
RBI - Three package options
• Isolate Risky
- Isolate uncategorized websites
- Isolate security categories (including Potentially Harmful)
• Isolate Any
- Isolate any chosen destination, including content categories, security categories,
destination lists, applications, uncategorized, etc.
© 2021 Cis c o and/or its affiliates . All rights res erv ed. Cis c o Confidential
RBI - Requirements
• HTTPS inspection must be enabled in the ruleset
• Domains/URLs required or intended for isolation cannot be included in Internal,
External bypass list or SSL decryption lists
• Browsers: Access to third-party cookies enabled
• Minimum supported browser versions:
- Apple Safari 9
- Google Chrome 34
- Microsoft Internet Explorer 10
- Microsoft Edge 12
- Mozilla Firefox 17
- Samsung Internet 11
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 215
215
RBI - Use cases
• Isolate risky destinations
- Uncategorized destinations, destinations in a particular content or security category
- Allow safe access to risky sites
- Ability to go to web apps but with some safeguards such as the ability to download
sanitized version of a document
• *RBI focuses on specific use-cases rather than isolating all web traffic.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 216
RBI - Use Cases Document Isolation
Document downloads will open in a cloud-hosted document viewer within the web page
instead of being downloaded automatically.
This is to protect the user against harmful 'macros' or embedded code that could be within
the document. However, the user will have the option to download the original
(unsanitized) version of the file, or a safe PDF converted version.
D o cument name
D o wnload Original (Unsanitized)
D o wnload PDF version (Sanitized)
D o cument Contents
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 217
217
RBI - Isolated Page Appearance
• Identify the Cisco Isolate Icon
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 218
218
RBI - Considerations
Sup ported files formats
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 222
https://support.umbrella.com/hc/en-us/articles/360060113992-Cisco-RBI-
Remote-Browser-Isolation-Supported-Formats-for-Document-Isolation
222
RBI - Reporting – Website isolated
Activity search > check the filter “Isolate”
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 224
224
Data Loss Prevention
(DLP)
225
SIG
DLP
OR
CASB
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 226
226
Multimode Cloud Data Loss Prevention (DLP)
Unified policies and reporting for a single customer experience
Cisco Cisco
Umbrella All destinations Umbrella
Real Time DLP SaaS API DLP
I have three enhancements to let you know about for CASB. The biggest one is
Multimode cloud DLP, which we plan to have generally available on November 30th.
What this means is that Umbrella will provide not just inline DLP, but also out-of-band
DLP.
Umbrella inline DLP scans outbound web traffic in real time through our secure web
gateway proxy, whereas out-of-band DLP is API-based and scans web traffic while it’s
at rest in the cloud, without going through a proxy, but with near real -time
performance.
The out-of-band DLP will support Cisco Webex, Google Drive, and Microsoft 365 (one
drive and sharepoint) at first, but support for more platforms will come later.
From a branding and user interface perspective, we are calling the inline DLP “Real -
Time DLP”, and the out-of-band DLP “SaaS API DLP’.
A VERY important point to make, is that other vendors do already provide both
modes of DLP, but a key differentiator in Cisco Umbrella will be the unified policies
227
and reporting between them, giving customers a single interface experience,
whereas the other vendors deliver two separate policy and reporting experiences,
so there’s a lot of back and forth between them that Umbrella customers won’t have
to deal with.
227
Multimode DLP: Exact Data Matching (EDM)
Reduces false positives while increasing true positives
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 228
228
like a combination of both name and social security
number, more strongly indicates the presence of a
sensitive record that should be protected.
228
Umbrella’s Exact Data Matching solution is a high
efficacy solution that reduces false positives while
increasing true positives, helping customers protect their
most critical data assets. Essentially, EDM fingerprints
sensitive data records from structured sources, such as
databases or spreadsheets, then monitors the
fingerprinted data and blocks it from being shared or
transferred inappropriately. Customers have great
flexibility in defining what is the most critical part in a
data record (for example could be the employee’s SSN)
and the fidelity of detection: should an event be raised
upon detecting a record in its entirety or would a partial
match suffice?
Will Exact Data Matching work with both Real Time DLP
and SaaS API DLP ?
Our Multimode DLP product provides unified data
classifications to simplify policy creation for both data-in-
motion and data-at-rest. Therefore, EDM and all other
228
data classification techniques are supported by both Real
Time and SaaS API DLP products.
228
Animation
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 229
229
Animation
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 230
230
Inline DLP - Fully integrated into SWG
• Cloud-native, leveraging SWG for connectivity, routing and SSL decryption
• Robust DLP classification via 80 pre-built data identifiers and user-defined
dictionaries for custom keywords
• Flexible DLP policy for granular control, targeting data, users/groups,
locations, cloud apps, destinations
• Detailed reporting for incidents covering identity, files names, destinations,
classification, pattern match, excerpt, triggered rule
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 231
231
DLP - Configuration Overview
P lan and design your C onfigure your Data C onfigure your DLP
Dat a Classifications C lassifications R u le
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 232
232
DLP events in reports
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 237
237
Module 8
Investigate
238
Investigate: the most powerful way to uncover
threats
Key points
Intelligence about domains, IPs,
and malware across the internet
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 239
- In a single, correlated source, Investigate provides the most complete view of the
relationships and evolution of domains, IPs, autonomous systems (ASNs), and file
hashes, and adds the security context needed to help you uncover and predict
threats.
- Investigate leverages a live graph database of DNS requests and other contextual
data. We take this massive amount of data and apply statistical models to it.
This helps us automatically discover and predict malicious domains and IPs.
- Additionally, with this information, you can enrich your existing security data with
our global intelligence.
239
A single, correlated source of intelligence
Passive DNS database
WHOIS record data
Malware file analysis
ASN attribution
IP geolocation
Domain and IP reputation scores
Domain co-occurrences
Anomaly detection (DGAs, FFNs)
DNS request patterns/geo. distribution
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 240
- All of this intelligence is available in a single, correlated source with Cisco Umbrella
Investigate.
- One of the biggest differentiators with this tool is that we are bringing together
many pieces of information.
- Without Investigate’s aggregate intelligence, organizations would need to try to get
this information from many other places, which is time consuming and only shows
one piece of the puzzle. Security teams are then left to figure out the correlations and
connections manually.
Additional Notes:
240
Domain to IP relationships (passive DNS)
12.4.0.4/32
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 241
- With Investigate and our wide view of internet infrastructure, we can see
relationships that otherwise would go undiscovered.
- One example, is the relationship between domains to IPs.
- Here, you can see that these three domains were all mapped to the same IP address
on different dates.
- This kind of insight would be especially important if you’re investigating an IP
address.
- Let’s say that this IP historically hosted only 3 domains, but Investigate can show you
that in the past week, this IP started hosting 10 new domains, 5 of which are
associated with malware.
241
Domain → IP → ASN relationships
domain1.com
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 242
- You can not only pivot between domains and IPs, but also ASNs.
- Think of ASNs as neighborhoods on the internet…you have your good
neighborhoods, your bad ones, and the neighborhoods you’re weary of.
- Investigate correlates and maps all of these relationships and enables you to pivot
between domains, IPs, and ASNs during incident investigations. By pivoting between
these, you can actually map out attackers infrastructure and uncover future attack
origins.
242
Domain co-occurrences
0.001
0.002
0.003
0.004
0.005
0.006
0.007
0 second
second
55.71.2.8/32
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 243
- If you recall earlier, we mentioned that every day we see more than 80 billion DNS
requests from about 65 million users worldwide.
- This gives us great insight into the patterns of DNS requests that are made from
people globally. You might be wondering what insight we gain from that data.
Alternative star if you mentioned co-occurrence model: You’re already familiar with
the co-occurrence model that pinpoints domains that are visited right before or after a
certain domain is queried. Well domain co-occurrences are also available in
Investigate.
- Consider this example: when you visit a website and it contains ads or content
hosted on third-party servers, then milliseconds after the initial domain is queried,
multiple other domains are also queried.
[CLICK]
- This shows a temporal pattern, and when we correlate it with millions upon millions
of patterns from our global user base, it enables us to statistically observe which
domains always follow or precede other domains in short time intervals.
243
- By looking at domain co-occurrences, we can uncover other domains that might be
related to the same attack. For example, you might visit one domain, but then you
could be automatically re-directed (without even knowing it) to a site that hosts
malware. Investigate can show you any co-occurrences and related domains for a
domain that you’re researching.
243
IP geo-location analysis
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 244
- Another element we analyze is where the IPs are hosted. Malicious hosts tend to
have multiple IP addresses that are located far away from each other, not on the
same network – since they are often compromised servers themselves. Here we can
see that this domains is hosted by IP addresses in more than 20 countries. While this
doesn’t confirm that it’s malicious, it ’s another piece of evidence.
- We also analyze the relationship of where the domain is hosted and where people
who are requesting the domain are located. For example, if a domain name has a
country-code in Russia but has a large amount of traffic from far away from that
country (i.e. the US), it is suspicious!
244
WHOIS record data
See relationships
between attackers’
infrastructure
• Who registered the domain
• Contact information used
• When/where registered
• Expiration date
• Historical data
• Correlations with other
malicious domains
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 245
- Attackers try to hide their tracks by changing their information when registering a
new domain, but they sometimes forget. So even a single piece of information can
give vital clues about the attacker or campaign.
- By incorporating WHOIS record data in Investigate – users will have insight about
who registered a domain, when and where it was registered – including contact
information and any changes over time.
- Our intelligence provides visibility into any malicious domains registered using any
of the same contact information, which can be used to tie attacks together.
245
Malware file
analysis data
Powered by Cisco Secure
Malware Analytics
(Formerly known as AMP
Threat Grid)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 246
- And with the integration of Cisco’s AMP Threat Grid data in Investigate, Investigate
can be used to uncover intelligence about the attacker’s piece of malware.
- Similar to how Investigate provides intelligence about the relationships between
domains, IPs and ASNs, Cisco AMP Threat Grid provides intelligence about malware
files so security teams can quickly understand what malware is doing or attempting
to do, how large a threat it poses, and how to defend against it.
- In Investigate, you can query by file hash (SHA256, SHA1, or MD5) , domain, IP, or
ASN. And get more insight into which are file hashes calling out to a given domain
with associate samples, their threat score, behavioral indicators, and other file
analysis data.
- Threat Grid license holders can even pivot directly into Threat Grid with a click of a
button
246
You know one IOC We know all its relationships
© 2023 Ci sco an d/or it s affi li ates. All ri gh ts reserved. Cisc o Con fi denti al 247
- You (the customer) may have one Indicator of Compromise (IOC), such as a
suspicious domain.
- We know all of the relationships with our global context. For example, we can tell
you all of the IP addresses its hosted on, which autonomous systems it’s associated
with, other related domains that it’s frequently queried with, its reputation, and
more.
247
Use our global intelligence to…
© 2023 Ci sco an d/or it s affi li ates. All ri gh ts reserved. Cisc o Con fi denti al 248
- The second major use case is speeding up investigations: Incident response times
can lag when security teams do not have the right context or access to pertinent
information early in the investigation. Investigate provides a single, correlated source
of threat intelligence about domains and IPs across the internet, and helps security
teams quickly do research during investigations.
- Third is using it to stay ahead of attacks: With Investigate you can uncover
infrastructure that attackers are leveraging for current attacks and even find domains
and IPs that they might leverage in the future. By finding related infrastructure, you
can proactively protect your organization from future attacks.
- The fourth use case category is enriching other systems with live data: There are
248
lots of ways that you can integrate Investigate with existing systems—for example, IT
ticketing systems or threat intelligence platforms— and enrich the data with our up-
to-the-minute, internet-scale intelligence.
248
Splunk Add-on for Cisco Umbrella Investigate
Automatically enrich security alerts inside Splunk,
allowing analysts to discover the connections between
the domains, IPs, and file hashes in an attacker’s
INVESTIGATE
infrastructure.
API
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 249
249
Module 9
Operations &
Troubleshooting
250
Umbrella Operations
251
Service Health
• Bookmark http://208.69.38.170/ and https://146.112.59.2/#/ so you can check
the Umbrella System Status pages even if local DNS is not available.
• Subscribe to the Cisco Umbrella Service Status page
at https://146.112.59.2/#/ to receive notifications about Service
Degradations, Service Outages, and/or Maintenance & Events.
• Follow the Service Updates subpages of https://support.umbrella.com/hc/en-
us/categories/204185887-Service-Updates
- Service Notifications: https://support.umbrella.com/hc/en-us/sections/206593887-
Service-Notifications
- Announcements: https://support.umbrella.com/hc/en-us/sections/206896108-
Announcements
- Service Updates: https://support.umbrella.com/hc/en-us/categories/204185887-
Service-Updates
• Periodically check the Cisco Umbrella Dashboard "Message Center" for product
alerts and notifications.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 252
252
Multi Factor Authentication (Dashboard)
• Implement two-step authentication (also known as two factor authentication)
for Umbrella dashboard users, as
per https://docs.umbrella.com/deployment-umbrella/docs/enable-two-
step-verification
• SMS OR IdP are the options.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 253
253
APIs to easily enable integration
Enrich data and extend protection across existing tools and workflows
CUSTOMER ENVIRONMENT UMBRELLA APIs
Network
devices
Umbrella
Network Enforcement Investigate
device API API API
Security
stack
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 254
Today, we have APIs that do some pretty amazing things, such as add more value to
existing products and make the deployment of Umbrella across a Meraki
network even easier.
254
The new API keys*
Name
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial * Cisco integrations pending 255
Tailored access to a flexible and broad collection of APIs with highly customizable API
keys
Ability to create multiple API keys and give them meaningful names
Legacy API keys are still supported. Cisco integrations are hard coded and require
those devices to be upgraded before they can support the new v2 API keys. Until then
customers must use the legacy API keys for Cisco integrations
255
Reporting
256
THREATS REPORT Quickly spot and remediate victims
Recent threat trends
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 257
257
DESTINATION REPORT Quickly assess extent of exposure
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 258
- Like the Identity reports, Destination reports will also be available laterin 2017.
- Destination reports enable a customer to investigate every malicious domain
attempted to be accessed from their organization.
For example, if you see that Umbrella blocked a user from going to
internetbadguys.com, you can view more detailed information like when the request
happened, who it came from, why it was blocked and more. With the local vs. global
data, you can also assess the likelihood that it is a more targeted attack. Has Umbrella
seen other people going to internetbadguys.com or are requests only coming from
you?
258
APP DISCOVERY REPORT Manage Shadow IT to enable secure cloud adoption
Ability to easily block
unapproved apps
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 259
- Like the Identity reports, Destination reports will also be available laterin 2017.
- Destination reports enable a customer to investigate every malicious domain
attempted to be accessed from their organization.
For example, if you see that Umbrella blocked a user from going to
internetbadguys.com, you can view more detailed information like when the request
happened, who it came from, why it was blocked and more. With the local vs. global
data, you can also assess the likelihood that it is a more targeted attack. Has Umbrella
seen other people going to internetbadguys.com or are requests only coming from
you?
259
Logging Best Practices
• Detailed logs are only kept for 30 days, then they are broken down into
aggregated report data.
• If you wish to keep a copy of the more detailed data longer than 30 days, set
up an Amazon S3 bucket to export your data to at "Settings -> Log
Management” or configure log ingestion on the customer SIEM.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 260
260
Log storage with Amazon S3
Pre-built integrations
TAP
Every 10 min
HTTPS | S3 Any SIEM
Amazon APIs
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 261
- When it comes to logs, another capability of Umbrella is the ability to export DNS
logs to Amazon S3 for long term storage.
- Umbrella will store logs for 30 days, and we have built an integration where you
can export logs at regular intervals to Amazon S3.
- By using this, you can store logs for as long as needed and even export the logs
from Amazon to a SIEM.
- Many customers ask for this functionality because they want the ability to go back
and review DNS logs when responding to an incident. For example, they may need
to go back to research an incident that may have occurred 2 years ago, and this
gives them the ability to retain logs as long as needed.
Do you have concerns about where your Cisco Umbrella logs are stored?
• With EU data sovereignty laws, storing EU-citizen data in a US-based data center
can complicate things for EU companies.
• Cisco Umbrella now makes it easy for EU companies to store their log data in the
EU.
• You now have the option to select an EU-based data center in Frankfurt, Germany
261
for your Umbrella log data storage.
• With our Multi-org console, you can also support both EU or US log storage
• You can configure Umbrella to have child orgs point to either storage location
261
Basic Troubleshooting
262
Useful information
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 263
263
Basic Troubleshooting – My IP address
When troubleshooting issues where networks are involved you may need to determine which IP you are
leaving your network from; the command below can help determine this for you.
nslookup myip.opendns.com
Server: 171.70.168.183
Address: 171.70.168.183#53
Non-authoritative answer:
Name: myip.opendns.com
Address: 128.107.241.167
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 264
264
Basic Troubleshooting - Dig
The next three command line examples are nslookups to one of our test domains that should be getting blocked
for hosting malware. The first two examples show the domain responding correctly and the last which is
pointed at another DNS resolver that we don’t control shows the domain not getting blocked. This is a quick way
to test if blocking is occurring still.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 265
265
Basic Troubleshooting – debug.opendns.com
The output here contains a few pieces of information
worthy of note. Orgid and Organization ID are the same
value and represent the number assigned to your
Dashboard. This number can be checked to make sure
you are getting a policy from your Dashboard.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 266
266
For a full listing of Umbrella Test Domains
Umbrella Test Domains refer here:
https://support.umbrella.com/hc/en-
us/articles/115000411528-What-are-the-
• Test Phishing: Umbrella-Test-Destinations-The
• http://www.internetbadguys.com
• Test Malware:
• http://www.examplemalwaredomain.com
• http://malware.opendns.com/
• Test CnC:
• http://www.examplebotnetdomain.com
• Test Content Filtering:
• http://www.exampleadultsite.com
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 267
267
Verify Cisco Certificate
• For HTTPS decryption and block page verify that Cisco Certificate is
installed.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 268
268
Talos
https://talosintelligence.com/reputation_center/lookup
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 269
269
Customer Health Check Checklist
https://learn-cloudsecurity.cisco.com/umbrella-resources/umbrella/customer-health-check-
checklist
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 270
270
Policy Debugging
271
Policy Tester
• Available under Policies > Management > DNS Policies > Policy Tester (Top Right Corner)
• Works by determining if specified identities can reach specified destinations based on current
policy settings.
• Only able to test against domains as destinations. URLs, IP addresses and CIDR ranges are not
supported and do not return results.
• For details on specific limitations please refer here.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 272
272
Policy Tester Results
• Trig gered Identity—The identity that has triggered the result. This is important if there is
more than one identity specified.
• Destination—Destination the test has attempted to reach.
• Result—Blocked or allowed. If blocked, it also lists why. The reasons include security
settings, category settings, and domain lists. Also, the name of the setting is listed.
• Destination List/Security Settings/Category Settings —For blocked results only. The
name of the setting or destination list that caused the block.
• Categorization—Umbrella's categorization of the destination. If there is no match, then
this information does not appear.
• Policy A pplied—The name of the policy against which the identity was evaluated.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 273
273
Block Page Diagnostic
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 274
274
http://policy-debug.checkumbrella.com
Link to the WEB policy
Umbrella ORG Id
Umbrella Origin ID
Ingress and egress IP
Troubleshooting
WEB Policy –
Endpoint view
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 275
#CiscoLive BRKSEC-2037 © 2021 Cisco and/or its affiliates. All rights reserved. Cisco Public 275
275
Umbrella Support
276
Summary of software support deliverables
For Umbrella packages
Software support for Cisco Umbrella
Enhanced Premium
Deliverables Required for Cisco Umbrella packages* Optional upgrade
Software updates ● ●
Prioritized case handling Prioritized over Basic option Prioritized over Enhanced option
Primary point of contact with software expertise ● ●
Onboarding guidance for Smart Accounts, configuration, migration,
● ●
and IT software integration
Learning and training** ● ●
Guidance for software usage ● ●
Support case analytics ●
Designated service management: assigned expert who provides incident, case,
●
and change management plus proactive consultation and recommendations
Note: Required attach for Cisco Umbrella packages DNS Essentials, DNS Advantage, and SIG Essentials
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 277
** Feature is dependent upon support contract amount
277
Opening a Support Case
1. You can email [email protected]
2. You can also contact umbrella via the dashboard. At the
bottom of the left-hand navigation bar you will see a
section labeled "Need Help". Here you will find the
email as well as the phone number, if your package
provides phone support.
3. Lastly you have the option to open a support case
within the support.umbrella.com portal. In the upper
right-hand corner you will see a blue "Submit a
request" link. Click on that and you will be able to
provide all the details required.
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 278
278
Module 10
SecureX
280
Introducing SecureX
A cloud-native, built-in platform experience within our portfolio
Cisco Secure Unified visibility Your infrastructure
Your
teams
SecOps
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial ITOps NetOps 281
Goals
Narrative
SecureX transforms your infrastructure from a series of disjointed solutions into a fully integrated ecosystem,
because it builds in capabilities across our portfolio AND connects to third-party tools, to enable intelligence
sharing and coordinated response – preventing threats from bypassing overwhelmed security teams.
We know you use other vendors besides Cisco. So, we’ve prioritized SecureX to be integrated and open to work
with every tool — Cisco or otherwise. If you rely on Microsoft to store identity, Splunk to store data, ServiceNow
for IT service management, or even our direct security competitors – great, connect them to SecureX!
Do you know of any other cloud-native platform that can simplify the security experience for ITOps and NetOps in
addition to SecOps?
281
SecureX isn’t another technology layer — rather it maximizes the potential of your existing security solutions. You
can start small with a single product and grow as your needs dictate.
281
SecureX architecture
SecureX sign-on with Duo MFA Ribbon framework
SecureX
Cisco products
Metrics Launch
Third party Dashboard TALOS
Triggers Triggers
Approval Orchestration
task/schedules (custom workflows)
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 282
Cisco SecureX
Cisco Secure
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 283
Enforcement
API Dashboards
CTR
Investigate Ribbon*
API Orchestration
Management
API
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 284
284
SecureX Threat Response & Umbrella Integrations
Seeing the information that comes from the various APIs
Reporting API
Investigate API
Enforcement API
285
Umbrella
Enrichment
• Local DNS requests
• Domain reputation
Response
• Block domains
Reference
• Pivot point to detailed domain, IP,
and file history
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 286
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 287
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 288
Day 2 Labs
289
Umbrella FE Labs
9. Secure Web Gateway
10. CASB / Cloud Malware
11. Data Loss Prevention
Day 2
© 2023 Cisco and/or it s af f iliat es. All right s reserved. Cisco Conf ident ial 290
290
291